A detailed description will follow with reference to the figures according to various embodiments.
The broadcast server 11 transmits a content to the receiving server 12 through broadcasting. The receiving server 12 receives and stores the content from the broadcast server 11 and sends the content to another apparatus in a home such as, for example, the transmission server 13 or the client 14 through the home network 22. The transmission server 13 receives the content from another server in the home such as, for example, the receiving server 12 and partially encrypts the content as hereinafter described. Further, the transmission server 13 stores a result of the partial encryption and re-transmits it to another server in the home such as, for example, the receiving server 12 or to the client 14. The client 14 is a client apparatus which acquires and reproduces a content from the receiving server 12 or the transmission server 13.
It is to be noted that the transmission server 13 may have a reception function of the receiving server 12, or the receiving server 12 may have a partial encryption function of the transmission server 13. Therefore, the receiving server 12 and the transmission server 13 may be formed as a single server to construct a network.
The timestamp has time information represented by a count value of a clock such as a DTS (Decoding Time Stamp) for performing a decoding operation or a PTS (Presentation Time Stamp) for performing reproduction. Further, the timestamp transfers a clock reference to control a PLL (Phase Locked Loop) so that the timing may coincide between the sending side and the reception side. The reference clock number is, for example, 27 MHz, and an SCR (System Clock Reference) and a PCR (Program Clock Reference) in a unit of a program are available.
The TS packet has a TP header of 4 bytes, in which, for example, copy control information representative of whether or not copy is permitted is described for the copyright protection. The copy control information includes a flag which represents copy allowed which indicates that copy is permitted without any restriction, copy once which indicates that copy is performed by only one generation and copy prohibited which indicates that copy is prohibited. Where copy is permitted by only one generation, it is permitted to store received broadcast data once, but it is not permitted to separately produce a copy of the stored broadcast data. Accordingly, it is prohibited to store broadcast data, for example, on a hard disk and then write out the stored broadcast data on a DVD (Digital Versatile Disk). However, it is permitted not to copy but move data, and if operation of deleting a file on the hard disk after the file is written out to a DVD is performed, then the movement is permitted.
In the present embodiment, content data sent from the broadcast server 11 includes description of copy control information representing that, for example, the content data can be coped by only one generation. Thus, when the receiving server 12 or the transmission server 13 tries to store the content data, it locally encrypts the content data with a key unique to the apparatus and then records the encrypted content data. For the encryption technique, the DES (Data Encryption Standard) or the Triple DES of a secret key encryption algorithm, the AES (Advanced Encryption Standard) which divides a key into a block and then encrypts the blocked key and so forth can be used.
The transmission server 13 in the present embodiment receives a content from the receiving server 12 and decodes the content based on a predetermined transmission system (scramble of a broadcast, DTCP-IP or the like). In this instance, while re-encryption (DES, AES, Triple DES or the like) of the content is performed for the storage, a timestamp portion of a TTS packet (Timed TS) is stored without being encrypted.
Then, the transmission server 13 re-transmits a content for which a request has been received from the client 14 using a predetermined protocol (for example, Upnp AV, HTTP, DTCP-IP or the like). At this time, where the request from the client 14 includes designation of a time position at which, for example, the TimeSeekRange.DLNA.org.HTTP header defined by the DLNA or the like is to be reproduced, the transmission server 13 seeks a timestamp portion which is not in an encrypted state to specify a desired position. Then, the transmission server 13 decrypts the encrypted portion and re-encrypts the decrypted portion for transfer and then transmits the re-encrypted portion to the client 14.
The transmission server 13 decrypts the received encrypted content to which timestamps are added in accordance with protocol specifications (DTCP-IP or the like) and then partially encrypts the decrypted content (encrypts except the timestamp portions). Consequently, when the content is to be re-transmitted in response to the time base seek request from the client 14, the transmission server 13 can transmit a content at the requested position rapidly and with a high degree of accuracy.
The CPU 101 executes various functions stored in the ROM 102 or the RAM 103. The inputting section 104 includes inputting keys, a mouse and so forth. The display section 105 is formed from, for example, a liquid crystal display apparatus or the like and displays various kinds of information in the form of a text or an image. The communication section 106 sends data received from the opposite party of communication to the CPU 101, RAM 103, storage section 107 or the like. The storage section 107 communicates information with the CPU 101 to store or erase information.
It is to be noted here that, while such a computer apparatus as shown in
The authentication function 131 performs an authentication process together with the receiving server 12 or the client 14. After the authentication comes to an end, the authentication function 131 shares a session key with the opposite party of communication and passes the session key to the cryptography processing function 135. It is to be noted that a key and a certificate used for such authentication such as the RSA (Rivest Shamir Adleman), EC (Electronic Commerce) and so forth of the public key cryptography are embedded in the apparatus at a point of time of commercialization.
The communication function 132 receives a message from the receiving server 12 or the client 14 and passes an authentication message to the authentication function 131 but passes any other message to the content management function 133. Further, the communication function 132 sends a message received from the authentication function 131 or the content management function 133 to the receiving server 12 or the client 14.
The content management function 133 exchanges a message with the receiving server 12 or the client 14 through the communication function 132 and performs a process in response to the message. For example, when the content management function 133 tries to acquire content data as content data for transmission from the receiving server 12, it issues an instruction to the cryptography processing function 135 to perform partial encryption of the content data in response to the message.
The content storage function 134 performs reading out or writing of information in response to a request from the content management function 133.
The cryptography processing function 135 encrypts or decrypts information in response to a request from the content management function 133. A key unique to the apparatus is used as the key upon such encryption or decryption. Further, in response to a request from the content management function 133, the cryptography processing function 135 performs partial encryption by which a timestamp portion is not encrypted or decrypted in response to a request from the content management function 133. A key for encryption or decryption to be used in communication of data with another apparatus is acquired by the authentication function 131. It is to be noted that a key for encryption or decryption (DES, Triple-DES, AES or the like) of content data is embedded in the apparatus upon commercialization or is produced uniquely to the client 14 using a Hash function or the like from an apparatus ID embedded in the apparatus upon commercialization.
The cryptography mode storage function 1351 receives and stores a cryptography mode from the outside such as the content management function 133. The cryptography mode storage function 1351 stores, upon extraction of raw data for storage, transmission or reproduction by the apparatus itself, whether content data stored in the content storage function 134 is in an entire cryptography mode wherein the apparatus unique key is used or in a partial encryption mode.
The data acceptance function 1352 receives partial data (multiple of a Timed TS or the like) from an external function such as the content storage function and writes the received partial data into the data buffer 1354. Further, the data acceptance function 1352 issues an instruction to start encryption/decryption in accordance with the mode of the cryptography mode storage function 1351 to the cryptography function 1355 upon completion of inputting of data.
The data extraction function 1353 extracts partial data (multiple of a Timed TS or the like) whose cryptographic process is completed from the data buffer 1354 and passes the extracted partial data to an external function such as the content storage function.
The data buffer 1354 temporarily stores data of an object of encryption or decryption.
The cryptography function 1355 performs an encryption process and a decryption process in response to the cryptography mode of the cryptography mode storage function 1351. For example, upon storage of content data, the cryptography function 1355 decrypts the content data with a session key acquired from the authentication function 131 and encrypts the decrypted content data with the apparatus unique key. On the other hand, upon transmission of content data, the cryptography function 1355 decrypts the content data with the apparatus unique key and then encrypts the decrypted content key with a session key. Further, upon extraction of raw data for reproduction by the apparatus itself or the like, the cryptography function 1355 decrypts the content data with the apparatus unique key. Here, when the apparatus unique key is used for encryption or decryption, the cryptography function 1355 performs encryption or decryption except timestamp portions in the data buffer 1354. It is to be noted that the apparatus unique key is acquired from the key storage function 1356.
The key storage function 1356 stores the apparatus unique key embedded upon commercialization. Further, the key storage function 1356 receives a session key from an external function such as the authentication function 131 and stores the session key. Then, the key storage function 1356 passes such keys in response to a request from the cryptography function 1355.
When the transmission server 13 tries to acquire a content from the receiving server 12, the content management function 133 sends a requesting message through the communication function 132 and receives an encrypted content from the communication function 132.
Then, for example, when the receiving server 12 acquires content data as data for transmission, the cryptography processing function 135 uses the decryption key received from the authentication function 131 to decrypt the content data received in accordance with a predetermined transfer protocol. Then, the cryptography processing function 135 re-encrypts the received content data except timestamps using the apparatus unique key and stores the re-encrypted content data into the content storage function 134.
On the other hand, for example, when the receiving server 12 acquires content data as content data for recording on a DVD (Digital Versatile Disk) or the like from the receiving server 12, the cryptography processing function 135 uses the decryption key received from the authentication function 131 to decrypt the content data received in accordance with a predetermined transfer protocol. Then, the cryptography processing function 135 re-encrypts all of the decrypted content data including the timestamps using the apparatus unique key and stores the re-encrypted content data on a DVD or the like. Consequently, the DVD or the like on which the content data re-encrypted with the apparatus unique key are recorded may not be reproduced by any other apparatus. It is to be noted that, where the content data do not have timestamps added thereto, all of the content data are re-encrypted with the apparatus unique key.
If the transmission server 13 receives a content request from the client or the like through the communication function 132, then the content management function 133 extracts the content from the content storage function 134, causes the cryptography processing function 135 to decrypt the content except the timestamps and then re-encrypt the content into a content for transfer, and sends the re-encrypted content through the communication function 132.
Here, if the transmission server 13 receives a time base seek request from the opposite party of communication such as the client 14, then the transmission server 13 successively searches for the timestamps in the content storage function 134 and causes the cryptography processing function 135 to decrypt content data beginning a portion (TS packet) which includes a desired position designated by the request. Consequently, the content at the desired position can be provided rapidly to the client 14 or the like.
Referring to
The reception function 121 receives content data from the broadcast server 11. It is to be noted that the reception function 121 may receive not only content data from the broadcast server 11 but also content data from a digital television broadcast or the like.
The authentication function 122 is similar to the authentication function 131 of the transmission server 13 and cooperated with the receiving server 12 or the client 14 to perform an authentication process.
The communication function 123 is similar to the communication function 132 of the transmission server 13, and receives a message from the transmission server 13 or the client 14 and passes an authentication message to the authentication function 122 but passes any other message to the content management function 124. Further, the communication function 123 sends a message received from the authentication function 122 or the content management function 124 to the transmission server 13 or the client 14.
The content management function 124 operates substantially similarly to the content management function 133 of the transmission server 13. However, the operation of the content management function 124 is different from that of the content management function 133 in that, where a content to be stored is to be encrypted, when a stored content is decrypted, it does not issue an instruction for partial encryption. In particular, when a time base seek request is received from the opposite party of communication, the content management function 124 extracts the content data beginning with the top of the same from the content storage function 125, decrypts the content data, searches for a desired position and sends the content data at the desired position to the opposite party of communication.
The content storage function 125 is similar to the content storage function 134 of the transmission server 13 and performs reading out and writing of information in request to a request from the content management function 124.
The cryptography processing function 126 encrypts or decrypts content data in response to a request from the content management function 124. The cryptography processing function 126 uses the apparatus unique key as the key in the encryption or decryption. A key for encryption and decryption to be used in communication of data with another apparatus is acquired from the authentication function 131. It is to be noted that the key for encryption and decryption (DES, Triple-DES, AES and so forth) of content data is either embedded upon commercialization or produced uniquely for the client 14 using a Hash function or the like from the apparatus ID embedded upon commercialization.
The receiving server 12 receives content data from the broadcast server 11 through the broadcasting network 21 and sends the content data to the transmission server 13 or the client 14 through the home network 22. For example, when content data acquired from the broadcast server 11 are to be sent to the transmission server 13, the receiving server 12 performs an authentication process with the transmission server 13 by means of the authentication function 122. Then, the receiving server 12 decrypts the content data encrypted using the apparatus unique key by means of the cryptography processing function 126 and encrypts the decrypted content data using the session key. Then, the receiving server 12 sends the encrypted content data to the transmission server 13 in accordance with a predetermined communication protocol such as the DTCP-IP or the like.
Referring to
The communication function 141 is similar to the communication function 123 of the receiving server 12, and receives a message from the receiving server 12 or the transmission server 13 and passes an authentication message to the authentication function 144 but passes any other message to the management function 142. Further, the communication function 141 sends a message received from the authentication function 144 or the management function 142 to the receiving server 12 or the transmission server 13.
The management function 142 exchanges a message with the receiving server 12 or the transmission server 13 through the communication function 141 in response to a request from the user request inputting function 146 and performs a process in response to the message.
The content display function 143 receives content data acquired from the receiving server 12 or the transmission server 13 and decrypted from the management function 142 and displays the received content data.
The authentication function 144 cooperates with the receiving server 12 or the transmission server 13 to perform an authentication process. An authentication message is sent and received through the communication function 141, and a key or a certificate which uses the RSA or EC to be used for authentication is embedded in the apparatus upon commercialization. After the authentication is completed, the authentication function 144 shares a session key with the opposite party of communication and passes the session key to the cryptography processing function 145.
The cryptography processing function 145 decrypts encrypted content data received from the receiving server 12 or the transmission server 13 in accordance with a predetermined transfer protocol. A key to be used in the decryption is received from the authentication function 144.
Here, if the client 14 tries to issue a time base seek request which designates a time position to be reproduced to the transmission server 13, then the client 14 sends a content request message, that is, a time base seek request, to the transmission server 13 through the communication function 141. Thus, the client 14 receives encrypted content data from the communication function 141. The encrypted content data are decrypted in accordance with the predetermined transfer protocol by the cryptography processing function 145. The management function 142 issues a request to display the decrypted content data to the content display function 143. Consequently, the content can be reproduced beginning with the time designated by the time base seek request.
Now, communication between servers and between a server and a client is described in detail.
The content storage function 125 of the receiving server 12 has stored therein contents with timestamps (Timed TS) which are encrypted with a key unique to the apparatus.
The content management function 133 of the transmission server 13 issues an authentication request to the authentication function 131 in order to acquire a content (step S11). The authentication request is conveyed from the communication function 132 through the communication function 123 of the receiving server 12 to the authentication function 122 (steps S12 to S14).
The authentication function 131 of the transmission server 13 and the authentication function 122 of the receiving server 12 cooperate with each other to perform authentication and key sharing (AKE: Authentication and Key Exchange) through the respective communication functions 123 and 132 (step S21). The ECDH (Elliptic Curve Diffie Hellman) or the like is used for the processes just mentioned. After the key sharing is completed, the authentication functions 122 and 131 set a session key to the respective cryptography processing functions 126 and 135 (steps S22 and S23).
The content management function 133 of the transmission server 13 issues a content request to the content management function of the receiving server 12 through the communication function 132 (steps S31 to S33).
The content management function 124 of the receiving server 12 receives the content request from the transmission server 13 and acquires requested encrypted content data (multiple of a Timed TS or the like) from the content storage function 125 (step S41). Then, the content management function 124 performs mode setting of the cryptography processing function 126 (step S42). In the mode setting, partial encryption for encrypting content data, to which timestamps are added, other than the timestamps or full encryption for encrypting entire data including timestamps is set.
After the mode setting is performed, the content management function 124 issues a decrypting and re-encrypting request of the content data to the cryptography processing function 126 (step S43). The cryptography processing function 126 decrypts the encrypted content data with the apparatus unique key and re-encrypts the decrypted content data with the session key and then passes the re-encrypted content data to the content management function 124 (step S44).
Then, the content management function 124 sends the content data as a response to the content request through the communication function 123 (step S45) to the transmission server 13 (step S46). The transfer protocol upon such sending may be an arbitrary one such as, for example, the HTTP or the RTP. The content management function 124 repeats the processes at steps S41 to S46 until all of the data of the requested content are processed.
The content management function 133 of the transmission server 13 receives the content response through the communication function 132 (step S51) and performs mode setting of the cryptography processing function 135 (step S52). Here, setting of the partial encryption for encrypting the data portion of the content data, to which timestamps are added, other than the timestamps is performed.
After the mode setting is performed, the content management function 133 issues a decrypting and re-encrypting request of the content data to the cryptography processing function 135 (step S53). The cryptography processing function 135 passes the content data decrypted with the session key and partially encrypted with the apparatus unique key to the content management function 133 (step S54). In particular, the cryptography processing function 135 stores the timestamps from within the decrypted content data directly into the content storage function 134 and partially encrypts a succeeding portion (payload) of the content data (up to a portion forwardly of a next timestamp) with the apparatus unique key. The content management function 133 stores the encrypted partial content data into the content storage function 134 (step S55).
The content management function 133 repeats the processes at steps S51 to S55 until all of the data of the requested content are processed.
The user would use the user request inputting function 146 to issue a content reproduction request. The content reproduction request can designate a reproduction start point in the form of time.
The authentication function 144 cooperates with the transmission server 13 to perform authentication and key sharing in response to the content reproduction request from the user request inputting function 146. The processes at steps S61 to S73 wherein a session key is shared and set to the cryptography processing function 145 after the authentication request is issued to the authentication function 144 are similar to those at steps S11 to S23 described hereinabove with reference to
After the key is shared, the management function 142 sends a time designation content request to the transmission server 13 through the communication function 141 (steps S81 to S83). The content management function 133 of the transmission server 13 receives the time designation content request from the client 14 and searches for a timestamp in the content storage function 134 based on the designated time (step S91). Here, the content management function 133 repeats a process of reading a next timestamp if the read timestamp is not the desired one. It is to be noted that a next timestamp exists at a fixed interval (for example, the size of the Timed TS). Consequently, the timestamp of the desired time can be searched out rapidly.
After the content management function 133 finds out the timestamp of the desired time, it acquires a partial content of the time designation following the desired position from the content storage function 134 (step S92) and performs mode setting of the cryptography processing function 126 (step S93). Here, setting of partial encryption for encrypting a data portion of the content data, to which timestamps are added, other than the timestamps is performed.
After the mode setting is performed, the content management function 133 issues a partial decrypting and re-encrypting request of the content data to the cryptography processing function 135 (step S94). The cryptography processing function 135 partially decrypts the partially encrypted content data with the apparatus unique key and performs re-encryption with the session key and then passes resulting re-encrypted content data to the content management function 133 (step S95). More particularly, the cryptography processing function 135 partially decrypts the portion (payload) of the partially encoded content data other than the timestamp (up to a portion forwardly of a next timestamp) with the apparatus unique key and then re-encrypts the content data including the timestamp portion with the session key.
The content management function 133 sends the re-encrypted content data to the client 14 through the communication function 132 (step S97). The content management function 124 repeats the processes at steps S92 to S96 until all of the data of the time-designation-requested content are processed.
The management function 142 of the client 14 receives the content data from the time designation position as a time designation content response through the communication function 141 (step S101) and passes the content data to the cryptography processing function 145 (step S102). The cryptography processing function 145 uses the session key to decrypt the content data and passes the decrypted content data to the management function 142 (step S103). Then, the management function 142 issues a content display request to the content display function 143 (step S104). Consequently, the time designated content is displayed on the display section of the client 14.
In this manner, according to the first embodiment, when content data are to be recorded, timestamps are not encrypted. Therefore, even if a request of designation of a reproduction start position of a content is received from the client 14, it is possible to search out a desired position and transmit the content to the client 14 rapidly.
Now, a second embodiment is described. In the second embodiment, when the transmission server 13 fetches content data with a timestamp, it stores bit rate information representing what bit number of data should be processed or sent and received per unit time as meta information and performs a search at a high speed.
Here, ES_rate flag in Flags of the PES packet indicates whether or not bit rate information is included. In the case of True, a bit rate is included in one field of Optional Fields. The bit rate information is 22 bit unsigned integer, and the unit thereof is 50 bytes/second.
Accordingly, the transmission server 13 has a decoding function of analyzing bit rate information. Thus, when content data are to be stored, the transmission server 13 analyzes the bit rate information and stores the bit rate information as meta information. Consequently, the transmission server 13 can estimate a rough position of desired content data from time designated from the client 14. Therefore, the transmission server 13 can refer to a timestamp to specify an accurate position.
The decoding function 151 analyzes a PES packet and checks the ES_rate flag in the Flags. Then, if the ES rate flag is True, then the decoding function 151 analyzes the inside of the Optional Fields to acquire bit rate information.
The content management function 133 stores the bit rate information acquired by the decoding function 151 as meta information of the content data into the content storage function 134.
The processes at steps S11 to S46 wherein, after an authentication request is issued from the transmission server 15 with a decoding function to the receiving server 12 in order to acquire a content, authentication is performed and content data are sent as a response to the content request from the receiving server 12 to the transmission server 15 with a decoding function are similar to those described hereinabove with reference to
The content management function 133 of the transmission server 15 with a decoding function receives the content response through the communication function 132 (step S51) and performs mode setting of the cryptography processing function 135 (step S201). Here, setting of partial encryption for encrypting a data portion of content data, to which timestamps are added, other than the timestamps is performed, and setting of raw data extraction for storing bit rate information of the content data as meta information is performed.
After the mode setting is performed, the content management function 133 issues a request for decoding of a portion of the content corresponding to the meta information to the cryptography processing function 135 (step S202) and issues a request for bit rate acquisition from raw data decoded by the decoding function 151 (step S203). The content management function 133 receives a bit rate from the decoding function 151 (step S204) and stores the bit rate into the content storage function 134 (step S205). At this time, the content management function 133 produces a file having a file name wherein a suffix of “.meta” is applied to the same prefix as the corresponding content, converts the value of ES_rate illustrated in
The processes at steps S61 to S83 wherein, after a content reproduction request is issued from the client 14, authentication is performed and a time designation content request is sent to the transmission server 15 with a decoding function are similar to those described hereinabove with reference to
After the time designation content request is received from the client 14, the content management function 133 of the transmission server 15 with a decoding function issues a request for meta information to the content storage function 134 (step S211), and acquires bit rate information from the content storage function 134 (step S212).
Then, the content management function 133 calculates a rough position of the time designation from the content data stored in the content storage function 134 based on the bit rate information and starts seeking (search) for the content position from the rough position (step S91). If the read out timestamp at the rough position is not a desired timestamp, then the content management function 133 decides based on a relationship in magnitude between the desired timestamp and the read out timestamp whether or not a timestamp to be read out next is earlier or later and then reads out the next timestamp. This is repeated until the desired timestamp is searched out. By using the bit rate information, the desired timestamp can be searched out further rapidly.
Thereafter, processes by the content management function 133 of acquiring the partial content of the time designation following the desired position from the content storage function 134, performing partial decryption and re-encryption and sending resulting data to the client 14 are executed at steps S92 to S97 and processes by the client 14 of receiving and decrypting the content data from the time designation position and displaying the content data on the display section are executed at steps S1101 to S104 similarly as in the processes described hereinabove with reference to
In this manner, according to the second embodiment, when content data are to be recorded, in order to acquire bit rate information, when a request for designation of a reproduction start position of a content is received from the client 14, it is possible to calculate a rough position based on bit rate information and search out a desired position rapidly.
In the second embodiment described above, when the transmission server 15 with a decoding function is to store content data, it analyzes bit rate information and stores the bit rate information as meta information. However, where the receiving server 12 has bit rate information as meta data, the bit rate information may be acquired from the receiving server 12 upon acquisition of a content. The receiving server 12 and the transmission server 13 in this instance have a configuration similar to that of the functional blocks shown in
The processes at steps S11 to S23 wherein, after an authentication request is issued from the transmission server 13 to the authentication function 131 in order to acquire a content, a session key is shared are similar to those described hereinabove with reference to
After the session key is shared, the content management function 133 of the transmission server 13 sends a bit rate request to the receiving server 12 through the communication function 132 (steps S311 to S313). The content management function 124 of the receiving server 12 receives the bit rate request and issues a request for meta information to the content storage function 125 (step S314). Then, the content management function 124 acquires the bit rate information from the content storage function (step S315). The content management function 124 sends the bit rate information as a reference from the communication function 123 to the transmission server 13 (steps S316 and S317).
The content management function 133 of the transmission server 13 receives the bit rate information (step S318) and stores the bit rate information into the content storage function 134 (step S319).
The processes at steps S31 to S46 and the processes at steps S51 to S55 are similar to those described hereinabove with reference to
According to an embodiment, speedup of a time base seeking operation of an encrypted content with a timestamp can be implemented.
While preferred embodiments have been described using specific terms, such description is for illustrative purpose only, and it is to be understood that changes and variations may be made without departing from the spirit or scope of the following claims. For example, while, in the embodiments described above, bit rate information is acquired through an analysis of a PES packet, the acquisition of bit rate information is not limited to this, but an average bit rate may be determined, for example, from a timestamp of a Timed TS and the full file size of content data. By this, even if the bit rate information of a content varies depending upon the time position, an accurate rough position can be specified.
It should be understood that various changes and modifications to the presently preferred embodiments described herein will be apparent to those skilled in the art. Such changes and modifications can be made without departing from the spirit and scope of the present subject matter and without diminishing its intended advantages. It is therefore intended that such changes and modifications be covered by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
P2006-182028 | Jun 2006 | JP | national |